Richard Weiss

Orcid: 0009-0007-6610-5197

Affiliations:
  • Evergreen State College, Olympia, WA, USA
  • University of Massachusetts, Amherst, MA, USA (former)
  • Harvard University, Cambridge, MA, USA (PhD 1976)


According to our database1, Richard Weiss authored at least 94 papers between 1988 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Tensor Decomposition for Student Success Prediction Models in Hands-on Cybersecurity Exercises.
Proceedings of the 56th ACM Technical Symposium on Computer Science Education V. 2, 2025

Creating Your Own Hands-on Cybersecurity Exercises.
Proceedings of the 56th ACM Technical Symposium on Computer Science Education V. 2, 2025

EDURange Cloud: On Demand Cybersecurity Sandboxes Through Kubernetes.
Proceedings of the Availability, Reliability and Security, 2025

2024
Cybersecurity Exercises in the Age of LLMs.
J. Comput. Sci. Coll., 2024

Developing a Modular Cloud-Based Kubernetes Powered Framework for Scalable Cybersecurity Education.
Proceedings of the 2024 ACM Virtual Global Computing Education Conference V. 2, 2024

Detecting Unsuccessful Students in Cybersecurity Exercises in Two Different Learning Environments.
Proceedings of the IEEE Frontiers in Education Conference, 2024

2022
Hands-on SQL injection in the classroom: lessons learned.
J. Comput. Sci. Coll., 2022

An authoring process to construct docker containers to help instructors develop cybersecurity exercises.
J. Comput. Sci. Coll., 2022

Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

2021
Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2021.
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021

2020
Predicting student success in cybersecurity exercises with a support vector classifier.
J. Comput. Sci. Coll., 2020

Using sentiment analysis to highlight the discrepancy between high and low resource language translations.
J. Comput. Sci. Coll., 2020

Refactoring a full stack web application to remove barriers for student developers and to add customization for instructors.
J. Comput. Sci. Coll., 2020

Cybersecurity Across All Disciplines in 2020.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

Using Terminal Histories to Monitor Student Progress on Hands-on Exercises.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

2019
A comparison of two hands-on cybersecurity frameworks.
J. Comput. Sci. Coll., 2019

Discussion of Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2019.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

Hands-on Cybersecurity Exercises that are Easy to Access.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

Measuring Student Learning On Network Testbeds.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

2018
Hands-on cybersecurity exercises.
J. Comput. Sci. Coll., 2018

Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2018: (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Perfect Harmony: Team Teaching Computing & Music.
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Building Out Data Science at Small Colleges: (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Four years experience: Making sensibility testbed work for SAS.
Proceedings of the 2018 IEEE Sensors Applications Symposium, 2018

2017
Applying a framework for creating and analyzing cybersecurity questions for peer instruction.
J. Comput. Sci. Coll., 2017

Pear deck: an interactive classroom response system to encourage student engagement.
J. Comput. Sci. Coll., 2017

Cybersecurity Education and Assessment in EDURange.
IEEE Secur. Priv., 2017

Live Lesson: The EDURange Framework and a Movie-themed Exercise in Network Reconnaissance.
Proceedings of the 2017 USENIX Workshop on Advances in Security Education, 2017

Building and Supporting a Community of CS Educators Teaching Cybersecurity in 2017 (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

The Passion, Beauty, and Joy of Teaching and Learning Cybersecurity.
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

Hands-on Cybersecurity Exercises That are Easy to Access and Assess (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

2016
Hands-on exercises about DNS attacks: details, setup and lessons learned.
J. Comput. Sci. Coll., 2016

Hands-on cybersecurity exercises for introductory classes: tutorial presentation.
J. Comput. Sci. Coll., 2016

Finding the Balance Between Guidance and Independence in Cybersecurity Exercises.
Proceedings of the 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016

A Reflective Approach to Assessing Student Performance in Cybersecurity Exercises.
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016

Assessment of Security Knowledge, Skills and Abilities using Hands-On Exercises in 2016 (Abstract Only).
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016

2015
3D printing in the classroom and laboratory.
J. Comput. Sci. Coll., 2015

Trust Evaluation in Mobile Devices: An Empirical Study.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Teaching Security Using Hands-on Exercises in 2015 (Abstract Only).
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

Teaching Cybersecurity Analysis Skills in the Cloud.
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

Can the Security Mindset Make Students Better Testers?
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

2014
The impact of computing courses for non-majors.
J. Comput. Sci. Coll., 2014

EDURange: hands-on cybersecurity exercises in the cloud.
J. Comput. Sci. Coll., 2014

EDURange: Meeting the Pedagogical Challenges of Student Participation in Cybertraining Environments.
Proceedings of the 7th Workshop on Cyber Security Experimentation and Test, 2014

Hands-on cybersecurity exercises in the EDURange framework (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

Teaching security using hands-on exercises (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

Teaching the security mindset with reference monitors.
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

BlurSense: Dynamic fine-grained access control for smartphone privacy.
Proceedings of the IEEE Sensors Applications Symposium, 2014

2013
Top 10 hands-on cybersecurity exercises.
J. Comput. Sci. Coll., 2013

Teaching cybersecurity through games: a cloud-based approach.
J. Comput. Sci. Coll., 2013

Hands-on cybersecurity exercises and the rave virtual environment (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Teaching security using hands-on exercises (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

2012
Teaching cybersecurity through interactive exercises using a virtual environment: <i>tutorial presentation</i>.
J. Comput. Sci. Coll., 2012

Hacking and the security curriculum: building community (abstract only).
Proceedings of the 43rd ACM technical symposium on Computer science education, 2012

Hands-on denial of service lab exercises using SlowLoris and RUDY.
Proceedings of the 2012 Information Security Curriculum Development Conference, 2012

2011
Teaching security labs with web applications, buffer overflows and firewall configurations.
J. Comput. Sci. Coll., 2011

Using the context of algorithmic art to change attitudes in introductory programming.
J. Comput. Sci. Coll., 2011

2010
The impact of OpenGL 3.X and 4.0 on the teaching of computer graphics: panel discussion.
J. Comput. Sci. Coll., 2010

2009
Algorithmic art.
J. Comput. Sci. Coll., 2009

Topics in digital terrain modeling.
J. Comput. Sci. Coll., 2009

2008
Synchronization coherence: A transparent hardware mechanism for cache coherence and fine-grained synchronization.
J. Parallel Distributed Comput., 2008

Finding your bot-mate: criteria for evaluating robot kits for use in undergraduate computer science education.
J. Comput. Sci. Coll., 2008

2007
CS0++ broadening computer science at the entry level: interdisciplinary science and computer science.
J. Comput. Sci. Coll., 2007

2006
Adding information assurance to the curriculum.
J. Comput. Sci. Coll., 2006

A cost-effective implementation of an ECC-protected instruction queue for out-of-order microprocessors.
Proceedings of the 43rd Design Automation Conference, 2006

2005
A Hierarchical Approach to Sign Recognition.
Proceedings of the 7th IEEE Workshop on Applications of Computer Vision / IEEE Workshop on Motion and Video Computing (WACV/MOTION 2005), 2005

Automatic Sign Detection and Recognition in Natural Scenes.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2005

2004
Fetch Halting on Critical Load Misses.
Proceedings of the 22nd IEEE International Conference on Computer Design: VLSI in Computers & Processors (ICCD 2004), 2004

2003
Combining Software and Hardware Monitoring for Improved Power and Performance Tuning.
Proceedings of the 7th Annual Workshop on Interaction between Compilers and Computer Architecture (INTERACT-7 2003), 2003

2002
Profile-guided post-link stride prefetching.
Proceedings of the 16th international conference on Supercomputing, 2002

2000
Can We Calibrate a Camera Using an Image of a Flat, Textureless Lambertian Surface?
Proceedings of the Computer Vision - ECCV 2000, 6th European Conference on Computer Vision, Dublin, Ireland, June 26, 2000

A Comparison of AES Candidates on the Alpha 21264.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

1999
Visual servoing control of autonomous robot calibration and navigation.
J. Field Robotics, 1999

Characterization of Errors in Compositing Panoramic Images.
Comput. Vis. Image Underst., 1999

1998
Robust Shape Recovery from Occluding Contours Using a Linear Smoother.
Int. J. Comput. Vis., 1998

1997
Obstacle Detection Based on Qualitative and Quantitative 3D Reconstruction.
IEEE Trans. Pattern Anal. Mach. Intell., 1997

1995
An O(N<sup>2</sup>) heuristic for steiner minimal trees in E<sup>3</sup>.
Networks, 1995

Epipolar curves on surfaces.
Image Vis. Comput., 1995

1994
Integrated control for interpreting and manipulating the robot environment.
Robotica, 1994

The Epipolar Parametrization.
Proceedings of the Object Representation in Computer Vision, 1994

Epipolar Fields on Surfaces.
Proceedings of the Computer Vision, 1994

Qualitative obstacle detection.
Proceedings of the Conference on Computer Vision and Pattern Recognition, 1994

1993
View Variation of Point-Set and Line-Segment Features.
IEEE Trans. Pattern Anal. Mach. Intell., 1993

Automatic Calibration and Visual Servoing for a Robot Navigation System.
Proceedings of the 1993 IEEE International Conference on Robotics and Automation, 1993

1991
Minimal length tree networks on the unit sphere.
Ann. Oper. Res., 1991

Image-based homing.
Proceedings of the 1991 IEEE International Conference on Robotics and Automation, 1991

Force domain models for multifingered grasp control.
Proceedings of the 1991 IEEE International Conference on Robotics and Automation, 1991

Feature matching in 360° waveforms for robot navigation.
Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 1991

1990
An Error Analysis for Surface Orientation from Vanishing Points.
IEEE Trans. Pattern Anal. Mach. Intell., 1990

Path planning using Laplace's equation.
Proceedings of the 1990 IEEE International Conference on Robotics and Automation, 1990

Combinatorial optimization applied to variable scale 2D model matching.
Proceedings of the 10th IAPR International Conference on Pattern Recognition, 1990

Vanishing point calculation as a statistical inference on the unit sphere.
Proceedings of the Third International Conference on Computer Vision, 1990

1989
Token-based extraction of straight lines.
IEEE Trans. Syst. Man Cybern., 1989

1988
Using characteristic invariants to infer new spatial relationships from old.
Proceedings of the 1988 IEEE International Conference on Robotics and Automation, 1988


  Loading...